Contact Us

How Penetration Testing is Performed.

Penetration testing comes in many forms and is often dependent on the type of application/ system being tested. This often falls into four categories. API penetration test, mobile penetration test/application penetration test, infrastructure penetration test, and web application penetration test. Each one of these types of tests has different steps and techniques. API Penetration Testing: … Read More

featured image for the blog post

How to check if you’ve been hacked by Pegasus

Pegasus Project is now one of the biggest scandals, with tens of thousands of government officials and journalists being hacked and surveilled by their own governments, and other countries using malware and spyware developed by NSO group; a ‘Cyber Intelligence’ company based in Israel.

Public, Powerful, and Free: The Hacker’s Arsenal

Public, Powerful and Free. The Hacker’s Arsenal. While it is true that some elite hacking tools are passed in the shadows, most of these business-breaking programs are available on the public internet and have thousands of developers. For any aspiring hacker, these applications allow them to complete tasks in seconds which, 5 years ago, would … Read More

Mobile App Security

When developing a mobile app it is important to implement security from the outset. Future additions or alterations may not be cost-effective and can dramatically increase the risk of users having their data stolen. Mobile security is one of the most overlooked parts of cyber security and many applications are built with no considerations about … Read More

Signing Your Life Away?

Have you been signing your life away? Remember those Terms and Conditions that nobody ever read? You know, the ones that we always used to see when we were downloading an app or signing up to subscribe to something? Sure, you do!

The Most Common TCP Ports And Their Services

The Most Common TCP Ports and Their Services When looking at the output of a port scan, many hackers will know which service many of them correspond to. However, this does not necessarily show how common these ports are. This post highlights which ports are ACTUALLY most common on the internet and the services they … Read More

Featured

What Is Clickjacking?

Clickjacking is a generally misunderstood security vulnerability that is often difficult to explain and understand. The attack itself has been around for some time now; the term comes from a portmanteau of the words “click” and “hijacking.” But what is clickjacking?

How To Become A Penetration Tester

Let us look into how to become a Penetration Tester or ‘Pentester’. The more penetration testers the better. With the world of ‘hacking’ ahead of you, it can be hard to know where to start. This blog post hopes to point you in the right direction and give you a guide to the mindset needed to become good at penetration testing.